13 December 2022

Fortinet releases emergency updates for severe FortiOS bug actively exploited in the wild


Fortinet releases emergency updates for severe FortiOS bug actively exploited in the wild

Fortinet has released emergency patches for a severe security vulnerability impacting its FortiOS SSL-VPN solution said to have been exploited in real-world attacks.

Tracked as CVE-2022-42475, the bug is a heap-based buffer overflow issue that allows a remote attacker to execute arbitrary code on the system. The vulnerability exists due to a boundary error within the sslvpnd daemon. A remote non-authenticated attacker can pass specially crafted data to the SSL-VPN interface, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

The issue impacts the following products: FortiOS version 7.2.0 through 7.2.2; FortiOS version 7.0.0 through 7.0.8; FortiOS version 6.4.0 through 6.4.10; FortiOS version 6.2.0 through 6.2.11; FortiOS-6K7K version 7.0.0; through 7.0.7; FortiOS-6K7K version 6.4.0 through 6.4.9; FortiOS-6K7K version 6.2.0 through 6.2.11; FortiOS-6K7K version 6.0.0 through 6.0.14.

“Fortinet is aware of an instance where this vulnerability was exploited in the wild, and recommends immediately validating your systems against the following indicators of compromise,” the company warned in its security advisory, urging customers to update their appliances.

The vendor has also provided indicators of compromise (IoCs), including a list of IP addresses observed exploiting the vulnerability, to help defenders detect infections.

Back to the list

Latest Posts

Cyber Security Week in Review: May 24, 2024

Cyber Security Week in Review: May 24, 2024

In brief: Google fixes Chrome zero-day, a backdoor found in JAVS software, and more.
24 May 2024
Chinese APTs increasingly using ORB networks to mask attack infrastructure

Chinese APTs increasingly using ORB networks to mask attack infrastructure

Mandiant reports that it is actively monitoring several ORB networks, with the most notable being SPACEHOP and FLORAHOX.
23 May 2024
Threat actors exploit vulnerable drivers to disable EDRs in cryptojacking attack

Threat actors exploit vulnerable drivers to disable EDRs in cryptojacking attack

Ghostengine deploys several modules to tamper with security tools, establish a backdoor, and ensure software updates are in place.
22 May 2024